• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: cybersecurity ]" (9)
  1. 1. A Data-Driven Study on Deriving Core Provisions for the Enactment of the Seoul Metropolitan Government Cybersecurity Ordinance
    Jiyeong Lee, Dohyun Kim, Vol. 26, No. 6, pp. 171-182, Dec. 2025
    10.7472/jksii.2025.26.6.171
    Keywords: cybersecurity, Research on Ordinance Legislation, Data-Driven Analysis, Derivation of core Provisions
  2. 2. A Survey of Semi-Supervised Learning in Cybersecurity: Methods, Domains, and Guidelines for Fair Evaluation
    Suchul Lee, Vol. 26, No. 6, pp. 1-12, Dec. 2025
    10.7472/jksii.2025.26.6.1
    Keywords: Semi-supervised learning, cybersecurity, Pseudo-labeling, Consistency regularization
  3. 3. Cybersecurity Job Market Analysis Using Online Recruitment Information
    Da-in Choi, Moohong Min, Vol. 26, No. 3, pp. 99-109, Jun. 2025
    10.7472/jksii.2025.26.3.99
    Keywords: cybersecurity, Cybersecurity Workforce, Job Analysis, Unsupervised learning, topic modeling
  4. 4. Cybersecurity Risk Assessment: An Asset-Based Approach to Pre-Attack Threat Analysis
    Hyunmin Lee, Kyungho Lee, Vol. 26, No. 3, pp. 19-33, Jun. 2025
    10.7472/jksii.2025.26.3.19
    Keywords: Attack trees, cybersecurity, data privacy, information security, Risk Analysis
  5. 5. A Research on RC3(RMF-CMMC Common Compliance) meta-model development in preparation for Defense Cybersecurity
    Jae-yoon Hwang, Hyuk-jin Kwon, Vol. 25, No. 1, pp. 123-136, Feb. 2024
    10.7472/jksii.2024.25.1.123
    Keywords: Cybersecurity Audit, Compliance, RMF, CMMC
  6. 6. An AI-Based Prevention Program to Protect Youth from Cybergrooming
    Kee Jeong Kim, Lifu Huang, Jin-Hee Cho, Vol. 24, No. 5, pp. 67-73, Oct. 2023
    10.7472/jksii.2023.24.5.67
    Keywords: Artificial intelligence (AI)-based simulation, Cybergrooming, cybersecurity, Children and Youth
  7. 7. A study on the cyber common operation picture for situational awareness in cyberspace
  8. 8. The direction of application of the RMF-based risk management system considering interoperability
    Hyuk-Jin Kwon, Sung-Tae Kim, Ye-na Joo, Vol. 22, No. 6, pp. 83-89, Dec. 2021
    10.7472/jksii.2021.22.6.83
    Keywords: CyberSecurity System engineering, Fuzzy, Secure SDLC, RMF
  9. 9. A study on the application of mission-based weapon system cybersecurity test and evaluation
    Ik-jae Kim, Ji-won Kang, Dong-kyoo Shin, Vol. 22, No. 6, pp. 71-81, Dec. 2021
    10.7472/jksii.2021.22.6.71
    Keywords: cybersecurity test and evaluation